Michael Geller has over 30 years of experience in advanced technology development and operations in Cyber Security with a focus on hyperscale networks, 5G and securing critical applications and the networks that deliver them. Mike is currently a Distinguished Cyber Security Architect focusing on protecting critical workloads, their API and the networks that deliver them. As an Adjunct Professor at University of Miami and University of Michigan, Mike is a lead Instructor for the Thrive DX Cyber Security program.
As a Principal Engineer at Cisco, Mike held several leadership positions over the 24 years there. Most recently as a leader in the GSAT or Global Security Architecture Team, responsible for security architecture across Cisco. Michael is a company leader for Security and Threat Defense. Michael’s recent focus is on 5G Security and the path to it – including security for cloud native as it relates to 5G Stand Alone and how to get there via 5G NSA and 4G. Michael’s research, development and customer facing work includes a 4G/5G threat surface analysis, segmentation and zero trust for the 5G network as it applies to application delivery and network slicing, and route science and security. Michael also focuses on the MSSP side of security delivery with a NetOps and SecOps focus now moving to a DevSecOps focus too. Michael led the ATIS Cybersecurity efforts and is active in other standards and consortium groups. Michael is deeply involved in go to market and technical evolution of the Threat Defense and Security As A Service for Cloud Providers, Service Providers and Enterprise building on traditional and evolving architectures and controls such as MSSP, NFV, Mobility and SDN. Prior to joining Cisco Michael designed and delivered the foundational technical systems for health care, education and public safety. He holds a Master’s of Science in MIS University and a Bachelor of Science in Mathematics/Economics. Michael is a fourth-degree black belt in Tae Kwon Do and most enjoys the company of his Wife, Rebecca and two children, Sarah and Ben.
In this session, Mike will identify where we have risk in keeping critical applications and the networks that deliver them available whether during peace time or when under attack. To properly dimension the risk, Mike will provide an overview of application and network threats. Then, he will investigate the attack lifecycle for both applications and networks that deliver them followed by an inspection of what security controls are relevant, and where we place them for maximum effectiveness, he will finish by covering what “protection” and “availability” look like in our networks today.